Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-35861

Опубликовано: 17 июл. 2022
Источник: nvd
CVSS3: 7.8
CVSS2: 4.6
EPSS Низкий

Описание

pyenv 1.2.24 through 2.3.2 allows local users to gain privileges via a .python-version file in the current working directory. An attacker can craft a Python version string in .python-version to execute shims under their control. (Shims are executables that pass a command along to a specific version of pyenv. The version string is used to construct the path to the command, and there is no validation of whether the version specified is a valid version. Thus, relative path traversal can occur.)

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:pyenv:pyenv:*:*:*:*:*:*:*:*
Версия от 1.2.24 (включая) до 2.3.2 (включая)

EPSS

Процентиль: 13%
0.00044
Низкий

7.8 High

CVSS3

4.6 Medium

CVSS2

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.8
debian
больше 3 лет назад

pyenv 1.2.24 through 2.3.2 allows local users to gain privileges via a ...

suse-cvrf
больше 3 лет назад

Security update for pyenv

CVSS3: 7.8
github
больше 3 лет назад

pyenv 1.2.24 through 2.3.2 allows local users to gain privileges via a .python-version file in the current working directory. An attacker can craft a Python version string in .python-version to execute shims under their control. (Shims are executables that pass a command along to a specific version of pyenv. The version string is used to construct the path to the command, and there is no validation of whether the version specified is a valid version. Thus, relative path traversal can occur.)

EPSS

Процентиль: 13%
0.00044
Низкий

7.8 High

CVSS3

4.6 Medium

CVSS2

Дефекты

CWE-22